|
|
Subscribe / Log in / New account

Arch Linux alert ASA-201909-3 (exim)

From:  Jelle van der Waa <jelle@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-201909-3] exim: arbitrary command execution
Date:  Wed, 11 Sep 2019 20:44:38 +0200
Message-ID:  <20190911184438.qawkt5oehpvmbihc@mail.archlinux.org>

Arch Linux Security Advisory ASA-201909-3 ========================================= Severity: Critical Date : 2019-09-06 CVE-ID : CVE-2019-15846 Package : exim Type : arbitrary command execution Remote : Yes Link : https://security.archlinux.org/AVG-1037 Summary ======= The package exim before version 4.92.2-1 is vulnerable to arbitrary command execution. Resolution ========== Upgrade to 4.92.2-1. # pacman -Syu "exim>=4.92.2-1" The problem has been fixed upstream in version 4.92.2. Workaround ========== None. Description =========== Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. Impact ====== A remote attacker is able to execute arbitrary commands with root privileges. References ========== https://exim.org/static/doc/security/CVE-2019-15846.txt https://security.archlinux.org/CVE-2019-15846


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds